⚠️ WARNING: Fake OpenClaw Site Delivering ScreenConnect RAT — Discord Users Targeted
A fake OpenClaw site is being shared in Discord servers. It installs a Remote Access Trojan (RAT) that gives attackers full control of your machine. Do not visit, download from, or run anything from the sites listed in this post.
On 2026-04-26 I identified an active phishing and RAT delivery campaign impersonating OpenClaw — a legitimate AI assistant project. The campaign is being distributed through Discord, directing users to a convincing clone of the official OpenClaw website that silently delivers a ScreenConnect Remote Access Trojan.
What Is OpenClaw?
OpenClaw (openclaw.ai) is a real, legitimate open-source AI assistant project. The attackers chose it as their lure because it is a developer-friendly tool — its target audience is exactly the kind of person who would run a curl | bash installer without a second thought.
The Fake Discord "bot"
The Fake Site
The malicious site is hosted at:
hxxps://openclaw-ai[.]replit[.]app/
It is not the real OpenClaw site. The real site is openclaw[.]ai. The fake site is a near-perfect visual clone — same branding, logo, testimonials, and features. It even displays the real openclaw.ai curl command in the Quick Start section to appear legitimate:
curl -fsSL https://openclaw[.]ai/install.sh | bash ← real command, shown to build trust
The OS-specific download buttons all point to a ScreenConnect RAT. The HTML <title> was accidentally left as "Remote Access" — the attacker's own name for the tool.
Screenshots of the Fake Site (Archived 2026-04-26)
Do not visit. Captured for forensic reference only.
![]() |
| frame1.jpg — Hero section: fake OpenClaw branding, logo, testimonials, and "OpenClaw Partners with Vaultbot for SIM Security" badge |
![]() |
| frame3.jpg — Integration list (Discord, Telegram, Slack) and community showcase, all cloned from real site |
![]() |
| frame5.jpg — Bottom footer. Note "Independent project, not affiliated with Anthropic." Page title is "Remote Access" |
The RAT: ScreenConnect (ConnectWise Control)
ScreenConnect is a legitimate remote desktop product frequently abused by threat actors: it installs as a persistent service that survives reboots, gives full remote desktop and file system access, and is often not flagged by antivirus. The attacker's tenant at urbarnturboproperty[.]screenconnect[.]com receives a connection the moment any download button is clicked and the installer runs.
Indicators of Compromise (IOCs)
All IOCs are DEFANGED. Replace [.] with . and hxxps with https in security tooling only.
Domains
openclaw-ai[.]replit[.]app
urbarnturboproperty[.]screenconnect[.]com
IP Addresses
40[.]160[.]26[.]157 (OVH: server-ovh30010027-web.screenconnect.com)
Malicious URLs
hxxps://openclaw-ai[.]replit[.]app/
hxxps://openclaw-ai[.]replit[.]app/install
hxxps://urbarnturboproperty[.]screenconnect[.]com/Bin/ScreenConnect.ClientSetup.exe?e=Access&y=Guest
hxxps://urbarnturboproperty[.]screenconnect[.]com/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
hxxps://urbarnturboproperty[.]screenconnect[.]com/Bin/ScreenConnect.ClientSetup.pkg?e=Access&y=Guest
hxxps://urbarnturboproperty[.]screenconnect[.]com/Bin/ScreenConnect.ClientSetup.deb?e=Access&y=Guest
hxxps://urbarnturboproperty[.]screenconnect[.]com/Bin/ScreenConnect.ClientSetup.rpm?e=Access&y=Guest
File Names
ScreenConnect.ClientSetup.exe (Windows EXE)
ScreenConnect.ClientSetup.msi (Windows MSI)
ScreenConnect.ClientSetup.pkg (macOS)
ScreenConnect.ClientSetup.deb (Linux Debian/Ubuntu)
ScreenConnect.ClientSetup.rpm (Linux RHEL/Fedora)
JS Bundle
hxxps://openclaw-ai[.]replit[.]app/assets/index-qi0BRuPc.js
HTML Artifact
<title>Remote Access</title> ← attacker's working title left in page source
Attack Chain
- Discord delivery — Fake account posts the fake site link in Discord servers
- Trust establishment — Site clones real openclaw.ai and shows real curl command
- RAT delivery — Victim clicks OS download button, receives ScreenConnect pre-pointed at attacker's tenant
- Persistent access — ScreenConnect installs as a system service, survives reboots
- Exfiltration — Credentials, SSH keys, tokens, wallets, files all accessible to attacker
If You Installed Anything From This Site
- Disconnect from the network immediately
- Find and remove ScreenConnect: Windows → Services / Add or Remove Programs; macOS →
launchctl list | grep -i screen; Linux →systemctl list-units | grep -i screen - Rotate all credentials: passwords, SSH keys, API tokens, AWS/GCP/Azure creds, GitHub tokens, crypto seed phrases
- Assume browser-saved passwords are compromised
- Consider full OS reinstall for sensitive machines
Verify the Real OpenClaw
- Official site:
openclaw[.]aionly — not any replit.app URL - Install script:
openclaw[.]ai/install.shonly - Always verify the domain in your browser address bar before running any installer
For Discord Admins
- Block and report accounts sharing
openclaw-ai[.]replit[.]app - Add domain to AutoMod blocked links list
- Report the Replit app at replit.com/report
Analysis: 2026-04-26. ScreenConnect tenant live at time of publication. All URLs DEFANGED.
— Igor Guarisma / guarismo.net




Comments
Post a Comment